Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Data encryption

550 results

Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition

978/084/931/9780849315497.jpg

Information Security Architecture: An Integrated Approach to Security in...

Jan Killmeyer (Tudor Engineering Management, Butler, Pennsylvania, USA)

Data encryption; Computer architecture & logic design

Hardback

Exploring the evolution of IS, this book incorporates the knowledge that has pushed the information security life cycle from... [more]

$183.00

We can order this in for you
How long will it take?
Add this item to my basket
Wireless Security Handbook

978/084/933/9780849333781.jpg

Wireless Security Handbook

Aaron E. Earle (AE&E Corporation, Redford, Michigan, USA)

Data encryption

Hardback

Presents an overview of wireless network security. This book examines wireless from multiple perspectives, including those... [more]

$183.00

We can order this in for you
How long will it take?
Add this item to my basket
The Database Hacker's Handbook: Defending Database Servers

978/076/457/9780764578014.jpg

The Database Hacker's Handbook: Defending Database Servers

David Litchfield, Chris Anley, John Heasman, Bill Grindlay

Data encryption

Paperback

Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
Official (ISC)2 (R) Guide to the CISSP (R)-ISSEP (R) CBK (R)

978/084/932/9780849323416.jpg

Official (ISC)2 (R) Guide to the CISSP (R)-ISSEP (R) CBK (R)

CISSP Susan Hansche

Data encryption

Hardback

A guide to the CISSP-ISSEP CBK. It promotes understanding of the four ISSEP domains: Information Systems Security Engineering... [more]

$156.00

We can order this in for you
How long will it take?
Add this item to my basket
Handbook of Elliptic and Hyperelliptic Curve Cryptography

$231.00

We can order this in for you
How long will it take?
Add this item to my basket
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks

978/084/932/9780849322723.jpg

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks...

R. R. Brooks, Clemson University

Computer security; Data encryption

Hardback

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. Disruptive... [more]

$263.00

We can order this in for you
How long will it take?
Add this item to my basket
A Practical Guide to Security Assessments

978/084/931/9780849317064.jpg

A Practical Guide to Security Assessments

Sudhanshu Kairab (Amper, Politziner, & Mattia, P.C., New Jersey, USA), P.C. Mattia

Business mathematics & systems; Data encryption

Hardback

Taking a process-focused approach, this book presents a methodology, an understanding of business goals and processes and... [more]

$166.00

We can order this in for you
How long will it take?
Add this item to my basket
Assessing and Managing Security Risk in IT Systems: A Structured Methodology

978/084/932/9780849322327.jpg

Assessing and Managing Security Risk in IT Systems: A Structured Methodology...

John McCumber

Computer security; Data encryption; Network management

Hardback

Presents an overview of information systems security, offering the basic underpinnings of information security and concluding... [more]

$135.00

We can order this in for you
How long will it take?
Add this item to my basket
Public Key Infrastructure: Building Trusted Applications and Web Services

978/084/930/9780849308222.jpg

Public Key Infrastructure: Building Trusted Applications and Web Services...

John R. Vacca (TechWrite, Pomeroy, Ohio, USA)

Software Engineering; Computer security; Data encryption; Computer networking & communications

Hardback

By allowing digital signatures to be as valid as handwritten signatures, public key infrastructure (PKI) provides businesses... [more]

$183.00

We can order this in for you
How long will it take?
Add this item to my basket
Cryptography For Dummies

978/076/454/9780764541889.jpg

Cryptography For Dummies

Chey Cobb

Coding theory & cryptology; Computing & IT; Data encryption

Paperback

Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping,... [more]

$59.95

We can order this in for you
How long will it take?
Add this item to my basket
The Art of Deception: Controlling the Human Element of Security

978/076/454/9780764542800.jpg

The Art of Deception: Controlling the Human Element of Security

Kevin D. Mitnick, William L. Simon

Society & Social Sciences; Privacy & data protection; Data encryption; Network security

Paperback

Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption... [more]

$26.95

We can order this in for you
How long will it take?
Add this item to my basket
Strategic Information Security

978/084/932/9780849320415.jpg

Strategic Information Security

John Wylder

Data encryption

Hardback

Integrates the importance of sound security policy with the strategic goals of an organization. This book offers an insight... [more]

$183.00

We can order this in for you
How long will it take?
Add this item to my basket
The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

978/084/930/9780849308888.jpg

The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks...

Susan Young, Dave Aitel, John D. Tessel, Felix Lindner

Computer fraud & hacking; Data encryption

Hardback

Reveals those aspects of hacking least understood by network administrators. This handbook analyzes subjects through a hacking/security... [more]

$210.00

We can order this in for you
How long will it take?
Add this item to my basket
Investigator's Guide to Steganography

978/084/932/9780849324338.jpg

Investigator's Guide to Steganography

Gregory Kipper (Computer Security Innovations, Herndon, Virginia, USA)

Coding theory & cryptology; Data encryption

Hardback

Looks at steganography, a form of hidden communication from its beginnings to modern uses. This book provides insight into... [more]

$183.00

We can order this in for you
How long will it take?
Add this item to my basket
Critical Incident Management

978/084/930/9780849300103.jpg

Critical Incident Management

Alan B. Sterneckert (Sandy, Utah, USA)

Data encryption

Hardback

Presents an overview of the elements that one needs to address to respond to network and information security violations.... [more]

$198.00

We can order this in for you
How long will it take?
Add this item to my basket
Managing A Network Vulnerability Assessment

978/084/931/9780849312700.jpg

Managing A Network Vulnerability Assessment

Thomas R. Peltier (Thomas R. Peltier Associates, LLC, Wyandotte, Michigan, USA), Justin Peltier (Thomas R. Peltier Associates, LLC, Wyandotte, Michigan, USA), John A. Blackley

Data encryption; Network security

Paperback

Offers a formal framework for finding and eliminating network security threats. This title focuses on the steps necessary... [more]

$150.00

We can order this in for you
How long will it take?
Add this item to my basket
Using the Common Criteria for IT Security Evaluation

978/084/931/9780849314049.jpg

Using the Common Criteria for IT Security Evaluation

Debra S. Herrmann (Biological Computing Initiative, North Bethesda, Maryland, USA)

Privacy & data protection; Data encryption

Paperback

Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification... [more]

$231.00

We can order this in for you
How long will it take?
Add this item to my basket
RSA and Public-Key Cryptography

978/158/488/9781584883388.jpg

RSA and Public-Key Cryptography

Richard A. Mollin (University of Calgary, Alberta, Canada)

Data encryption

Hardback

Offers a detailed treatment of public-key cryptography (PKC), from RSA, the first public key system devised in 1978, to the... [more]

$231.00

We can order this in for you
How long will it take?
Add this item to my basket
The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques

$183.00

We can order this in for you
How long will it take?
Add this item to my basket
Guide to Operating Systems Security

978/061/916/9780619160401.jpg

Guide to Operating Systems Security

Michael Palmer

Operating systems; Data encryption; Network security

Mixed media product

This guide is designed to expand networking student's basic network and operating system skills to include planning, implementation... [more]

$249.95

We can order this in for you
How long will it take?
Add this item to my basket
Building an Information Security Awareness Program

978/084/930/9780849301162.jpg

Building an Information Security Awareness Program

Mark B. Desman

Computer security; Data encryption; Computer networking & communications

Paperback

Takes readers through developing, distributing, and monitoring an information security awareness program. This book includes... [more]

$183.00

We can order this in for you
How long will it take?
Add this item to my basket
A Practical Guide to Security Engineering and Information Assurance

978/084/931/9780849311635.jpg

A Practical Guide to Security Engineering and Information Assurance

Debra S. Herrmann (Biological Computing Initiative, North Bethesda, Maryland, USA)

Communications engineering & telecommunications; Privacy & data protection; Data encryption

Hardback

Offers an insight into the broader realm of information assurance (IA). This book explains real-world strategies applicable... [more]

$210.00

We can order this in for you
How long will it take?
Add this item to my basket
A Technical Guide to IPSec Virtual Private Networks

978/084/930/9780849308765.jpg

A Technical Guide to IPSec Virtual Private Networks

James S. Tiller (Raleigh, North Carolina, USA)

Reference works; Computer security; Data encryption; Computer networking & communications; Networking standards & protocols

Paperback

Cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security.... [more]

$183.00

We can order this in for you
How long will it take?
Add this item to my basket
Coding Theory and Cryptography: The Essentials, Second Edition

978/082/470/9780824704650.jpg

Coding Theory and Cryptography: The Essentials, Second Edition

D. C. Hankerson, Gary S. Hoffman, D. G. Hoffman, Charles C. Lindner, D. A. Leonard

Coding theory & cryptology; Applied mathematics; Data encryption

Hardback

Containing data on number theory, encryption schemes, and cyclic codes, this textbook presents coding theory, construction,... [more]

$185.00

We can order this in for you
How long will it take?
Add this item to my basket
Secure Computers and Networks: Analysis, Design, and Implementation

978/084/931/9780849318689.jpg

Secure Computers and Networks: Analysis, Design, and Implementation

Eric A. Fisch (KPMG LLP, Plano, Texas, USA), Gregory B. White (SecureLogix, San Antonio, Texas, USA), Udo W. Pooch

Data encryption

Hardback

Presents an information on analyzing, designing, and implementing various aspects of computer network security. This book... [more]

$273.00

We can order this in for you
How long will it take?
Add this item to my basket
My Shopping Basket
Your cart does not contain any items.